When corporate communications look like a phish

Before organizations engage in gnashing of teeth over the “ignorant user” and the cost of training, think about how much email users encounter and whether corporate communications look like phishes themselves.

Read more

Leaks and breaches: a roundup

There’s been some huge leaks and breaches over the last few days, impacting everything from regular logins to important financial documents. What’s the fallout?

Read more

A week in security (March 18 – 24)

A roundup of cybersecurity news from March 18–24, including Facebook’s privacy pivot, password reuse, new research on hospital phishing attacks, infected iPhone apps, and more.

Read more

Business email compromise scam costs Pathé $21.5 million

Recently released court documents show European-based cinema chain Pathé lost a small fortune to a business email compromise (BEC) scam in March 2018. The attack cost the company $21.5 million—that’s 10 percent of its total earnings. Learn how to avoid BEC scams and keep your company in the black.

Read more

How to create a sticky cybersecurity training program

Organizations know that training employees is not only expensive but time-consuming. But when it comes to cybersecurity, training is a must. Whether you’re an organization of 50 or 50,000, this guide will show you the ropes in creating a cybersecurity training program that works from start to finish.

Read more

Insider threats in your work inbox

A new phishing campaign that targets businesses goes beyond business email compromise or CEO fraud.

Read more

The top 5 dumbest cyber threats that work anyway

The common conception of cyber attacks is kind of like bad weather: ranging from irritating to catastrophic, but always unpredictable. Hackers are simply too sophisticated to draw any reliable judgments on and we shouldn’t try. As it turns out, some hackers are fairly predictable in their successful use of really dumb attacks.

Read more

How do I get my employees to stop clicking on everything?

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has been bedeviling. How do you get your employees to stop clicking on everything?

Read more

Select your language